BUSINESS
SURVEILLANCE
allowing bad actors to access networks
or to directly infect them with malware.
Evolving threats
As the pandemic and the response to
it has evolved, so have cybercriminals’
strategies and attacks. The scams
change to match what people are
talking about.
Many of the first phishing attacks
impersonated specialists from Wuhan,
China. Criminals then masqueraded as
regional authorities and later, businesses
communicating with their employees.
In the Middle East, many businesses
and authorities have had to warn
customers and residents of fake emails
being sent out in their name. Some
regional airlines shared warnings about
malicious emails offering them refunds
on cancelled flights.
Links were used to
capture credentials,
allowing bad actors
to access networks
or to directly infect
them with malware.
On our own grid, our Threat Intelligence
team discovered a phishing scam
offering an immediate air ticket refund in
exchange for credit card details.
The Central Bank of UAE released an
announcement at the end of March,
saying: “Fraudsters always look for
opportunities to target consumers, and
as the public is engaged with COVID-19
pandemic news, they are using different
tactics to increase fraudulent activities
on banking customers.”
The most popular COVID-19 phishing
scam themes seen by the Mimecast
Threat Intelligence team include:
COVID-19 policy updates – Emails
designed to look like they’re from HR
departments, directing employees to
‘login’ and read updated business
policies regarding the pandemic and
working from home.
Coronavirus testing – Offering DIY kits,
which take victims to fake sites where
they capture their credit card data.
Virus updates from healthcare
authorities – With fake links to the
Centres for Disease Control and
Prevention (CDC) and World Health
Organisation (WHO).
64 Issue 28 | www.intelligentciso.com